Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09-11-2020 20:19
Static task
static1
Behavioral task
behavioral1
Sample
f6eb3ee5a5791580cb437aed0ed50ee7.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
f6eb3ee5a5791580cb437aed0ed50ee7.exe
Resource
win10v20201028
General
-
Target
f6eb3ee5a5791580cb437aed0ed50ee7.exe
-
Size
346KB
-
MD5
f6eb3ee5a5791580cb437aed0ed50ee7
-
SHA1
42390aa36dd526141c798849a02dfdebcbd17eb5
-
SHA256
12f341bc0f65e96848b4dd440afc7f653e883e740adcb677fc4f8b5ba5c38ef2
-
SHA512
c94f46ffef834d6b00240bd4431f5dc191c75fbfa6b6ed31a7a94a23b93084a0d69d00cf24e66d8b919c8b58de365b70fa3bb461e51c153c7b747f6b0cbc0527
Malware Config
Extracted
xpertrat
3.0.10
msn
127.0.0.1:666
194.5.99.136:3135
D7X4P1B8-Q5O3-S1E1-N0C3-X4R7E8E2T6P3
Signatures
-
CoreEntity .NET Packer 1 IoCs
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
Processes:
resource yara_rule behavioral2/memory/1112-4-0x0000000004790000-0x0000000004792000-memory.dmp coreentity -
XpertRAT Core Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/360-14-0x0000000000400000-0x0000000000443000-memory.dmp xpertrat behavioral2/memory/360-15-0x0000000000401364-mapping.dmp xpertrat behavioral2/memory/360-16-0x0000000000400000-0x0000000000443000-memory.dmp xpertrat -
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
Processes:
resource yara_rule behavioral2/memory/1112-6-0x0000000004D10000-0x0000000004D43000-memory.dmp rezer0 -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\D7X4P1B8-Q5O3-S1E1-N0C3-X4R7E8E2T6P3 = "C:\\Users\\Admin\\AppData\\Roaming\\D7X4P1B8-Q5O3-S1E1-N0C3-X4R7E8E2T6P3\\D7X4P1B8-Q5O3-S1E1-N0C3-X4R7E8E2T6P3.exe" iexplore.exe -
Processes:
f6eb3ee5a5791580cb437aed0ed50ee7.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" f6eb3ee5a5791580cb437aed0ed50ee7.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
iexplore.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\D7X4P1B8-Q5O3-S1E1-N0C3-X4R7E8E2T6P3 = "C:\\Users\\Admin\\AppData\\Roaming\\D7X4P1B8-Q5O3-S1E1-N0C3-X4R7E8E2T6P3\\D7X4P1B8-Q5O3-S1E1-N0C3-X4R7E8E2T6P3.exe" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\D7X4P1B8-Q5O3-S1E1-N0C3-X4R7E8E2T6P3 = "C:\\Users\\Admin\\AppData\\Roaming\\D7X4P1B8-Q5O3-S1E1-N0C3-X4R7E8E2T6P3\\D7X4P1B8-Q5O3-S1E1-N0C3-X4R7E8E2T6P3.exe" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run iexplore.exe -
Processes:
f6eb3ee5a5791580cb437aed0ed50ee7.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f6eb3ee5a5791580cb437aed0ed50ee7.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
f6eb3ee5a5791580cb437aed0ed50ee7.exef6eb3ee5a5791580cb437aed0ed50ee7.exedescription pid process target process PID 1112 set thread context of 420 1112 f6eb3ee5a5791580cb437aed0ed50ee7.exe f6eb3ee5a5791580cb437aed0ed50ee7.exe PID 420 set thread context of 360 420 f6eb3ee5a5791580cb437aed0ed50ee7.exe iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
f6eb3ee5a5791580cb437aed0ed50ee7.exepid process 420 f6eb3ee5a5791580cb437aed0ed50ee7.exe 420 f6eb3ee5a5791580cb437aed0ed50ee7.exe 420 f6eb3ee5a5791580cb437aed0ed50ee7.exe 420 f6eb3ee5a5791580cb437aed0ed50ee7.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
f6eb3ee5a5791580cb437aed0ed50ee7.exeiexplore.exedescription pid process Token: SeDebugPrivilege 1112 f6eb3ee5a5791580cb437aed0ed50ee7.exe Token: SeDebugPrivilege 360 iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
f6eb3ee5a5791580cb437aed0ed50ee7.exeiexplore.exepid process 420 f6eb3ee5a5791580cb437aed0ed50ee7.exe 360 iexplore.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
f6eb3ee5a5791580cb437aed0ed50ee7.exef6eb3ee5a5791580cb437aed0ed50ee7.exedescription pid process target process PID 1112 wrote to memory of 420 1112 f6eb3ee5a5791580cb437aed0ed50ee7.exe f6eb3ee5a5791580cb437aed0ed50ee7.exe PID 1112 wrote to memory of 420 1112 f6eb3ee5a5791580cb437aed0ed50ee7.exe f6eb3ee5a5791580cb437aed0ed50ee7.exe PID 1112 wrote to memory of 420 1112 f6eb3ee5a5791580cb437aed0ed50ee7.exe f6eb3ee5a5791580cb437aed0ed50ee7.exe PID 1112 wrote to memory of 420 1112 f6eb3ee5a5791580cb437aed0ed50ee7.exe f6eb3ee5a5791580cb437aed0ed50ee7.exe PID 1112 wrote to memory of 420 1112 f6eb3ee5a5791580cb437aed0ed50ee7.exe f6eb3ee5a5791580cb437aed0ed50ee7.exe PID 1112 wrote to memory of 420 1112 f6eb3ee5a5791580cb437aed0ed50ee7.exe f6eb3ee5a5791580cb437aed0ed50ee7.exe PID 1112 wrote to memory of 420 1112 f6eb3ee5a5791580cb437aed0ed50ee7.exe f6eb3ee5a5791580cb437aed0ed50ee7.exe PID 420 wrote to memory of 360 420 f6eb3ee5a5791580cb437aed0ed50ee7.exe iexplore.exe PID 420 wrote to memory of 360 420 f6eb3ee5a5791580cb437aed0ed50ee7.exe iexplore.exe PID 420 wrote to memory of 360 420 f6eb3ee5a5791580cb437aed0ed50ee7.exe iexplore.exe PID 420 wrote to memory of 360 420 f6eb3ee5a5791580cb437aed0ed50ee7.exe iexplore.exe PID 420 wrote to memory of 360 420 f6eb3ee5a5791580cb437aed0ed50ee7.exe iexplore.exe PID 420 wrote to memory of 360 420 f6eb3ee5a5791580cb437aed0ed50ee7.exe iexplore.exe PID 420 wrote to memory of 360 420 f6eb3ee5a5791580cb437aed0ed50ee7.exe iexplore.exe PID 420 wrote to memory of 360 420 f6eb3ee5a5791580cb437aed0ed50ee7.exe iexplore.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
f6eb3ee5a5791580cb437aed0ed50ee7.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f6eb3ee5a5791580cb437aed0ed50ee7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6eb3ee5a5791580cb437aed0ed50ee7.exe"C:\Users\Admin\AppData\Local\Temp\f6eb3ee5a5791580cb437aed0ed50ee7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\f6eb3ee5a5791580cb437aed0ed50ee7.exe"{path}"2⤵
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:420 -
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\f6eb3ee5a5791580cb437aed0ed50ee7.exe3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:360